Q1. DRAG DROP
Drag each OSPF route-type identifier on the left to its description on the right.
Q2. Refer to the exhibit.
Which statement is true about why the first-hop PIM IPv6 router is stuck in registering?
A. The scope of the IPv6 multicast address is link-local.
B. The outgoing interface for the IPv6 multicast group should not be a tunnel interface.
C. The R-bit is set in the IPv6 address, but this is not an embedded RP multicast IPv6 address.
D. The S flag should not be set on a first-hop PIM router.
E. A multicast IPv6 address does not start with FF.
.R bit: RP bit: R = 1 indicates the address embeds the address of the Rendezvous Point (RP). The embedded RP address needs to begin with the prefix FF70::/12, But here we see that the address is FF7E::1234.
Q3. Refer to the exhibit.
What is the role of this multicast router?
A. a first-hop PIM router
B. a last-hop PIM router
C. a PIM rendezvous point
D. a PIM inter-AS router
The following is sample output from the show ip pim tunnel taken from an RP. The output is used to verify the PIM Encap and Decap Tunnel on the RP:
Switch# show ip pim tunnel
Type : PIM Encap
RP : 188.8.131.52*
Type : PIM Decap
RP : 184.108.40.206*
The asterisk (*) indicates that the router is the RP. The RP will always have a PIM Encap and Decap Tunnel interface.
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3650/software/release/3se/multic ast/command_reference/b_mc_3se_3650_cr/b_mc_3se_3650_cr_chapter_010.html#wp12 86920037
Q4. Which two options describe two functions of a neighbor solicitation message? (Choose two.)
A. It requests the link-layer address of the target.
B. It provides its own link-layer address to the target.
C. It requests the site-local address of the target.
D. It provides its own site-local address to the target.
E. It requests the admin-local address of the target.
F. It provides its own admin-local address to the target.
Neighbor solicitation messages are sent on the local link when a node wants to determine the link-layer address of another node on the same local link (see the figure below). When a node wants to determine the link-layer address of another node, the source address in a neighbor solicitation message is the IPv6 address of the node sending the neighbor solicitation message. The destination address in the neighbor solicitation message is the solicited-node multicast address that corresponds to the IPv6 address of the destination node. The neighbor solicitation message also includes the link-layer address of the source node.
Figure 1. IPv6 Neighbor Discovery: Neighbor Solicitation Message
After receiving the neighbor solicitation message, the destination node replies by sending a neighbor advertisement message, which has a value of 136 in the Type field of the ICMP packet header, on the local link. The source address in the neighbor advertisement message is the IPv6 address of the node (more specifically, the IPv6 address of the node interface) sending the neighbor advertisement message. The destination address in the neighbor advertisement message is the IPv6 address of the node that sent the neighbor solicitation message. The data portion of the neighbor advertisement message includes the link-layer address of the node sending the neighbor advertisement message. After the source node receives the neighbor advertisement, the source node and destination node can communicate.
Q5. Refer to the exhibit.
Which statement is true?
A. The output shows an IPv6 multicast address with link-local scope.
B. The output shows an IPv6 multicast address that is used for unique local sources only.
C. The output shows an IPv6 multicast address that can be used for BIDIR-PIM only.
D. The output shows an IPv6 multicast address with embedded RP.
Q6. Refer to the exhibit.
Which configuration must you apply to router R2 to enable BFD?
A. Exhibit A
B. Exhibit B
C. Exhibit C
D. Exhibit D
Q7. Which two statements about 802.1Q tunneling are true? (Choose two.)
A. It requires a system MTU of at least 1504 bytes.
B. The default configuration sends Cisco Discovery Protocol, STP, and VTP information.
C. Traffic that traverses the tunnel is encrypted.
D. It is supported on private VLAN ports.
E. MAC-based QoS and UDLD are supported on tunnel ports.
F. Its maximum allowable system MTU is 1546 bytes.
Q8. By default, how does a GET VPN group member router handle traffic when it is unable to register to a key server?
A. All traffic is queued until registration is successful or the queue is full.
B. All traffic is forwarded through the router unencrypted.
C. All traffic is forwarded through the router encrypted.
D. All traffic through the router is dropped.
In the basic GETVPN configuration, the traffic passing through group members will be sent in clear until it registers with the Key Server. This is because the crypto ACL is configured on the KS and GM will get that information only after the registration is successful. This means for a short period of time the traffic can go out unencrypted after a GM is booted up or the existing GETVPN session is cleared manually. This mode is called “fail open” and it is the default behavior. This behavior can be turned off by configuring “Fail Close” mode on the GMs.
Q9. What are two benefits of NVI? (Choose two.)
A. It provides scalability by maintaining a NAT table on every interface.
B. It can dynamically create a static route to the NAT pool for translation.
C. It supports the use of route maps for policy-based NAT.
D. It supports the use of a single interface for translations.
E. It injects a route into the existing routing protocol that directs translation to the NAT pool.
Q10. Which option describes a limitation of Embedded Packet Capture?
A. It can capture data only on physical interfaces and subinterfaces.
B. It can store only packet data.
C. It can capture multicast packets only on ingress.
D. It can capture multicast packets only on egress.
Restrictions for Embedded Packet Capture
. In Cisco IOS Release 12.2(33)SRE, EPC is supported only on 7200 platform.
. EPC only captures multicast packets on ingress and does not capture the replicated packets on egress.
. Currently, the capture file can only be exported off the device; for example, TFTP or FTP servers and local disk.
To know more about the 400-101, click here.